THE MOST IMPORTANT PIECE OF YOUR IT SECURITY INFRASTRUCTURE
• The key to building successful IT Sec teams
• Learn to recognize that potential in new talent today
• How to provide them the environment to become the future leaders in IT Security
DONALD CAVENDER
SPECIAL AGENT CYBER CRIME, FBI
10:30
COFFEE & NETWORKING BREAK
10.50
VIP ROUND TABLE SESSIONS
DISINFORMATION, CYBER SECURITY, AND HOW TO LOSE: LESSONS FROM THE US
Nearly every day, a new revelation about the extent of the Russian influence campaign in the US presidential election is revealed. Several Congressional committees and intelligence agencies are investigating the
extent of Russian influence. What can the US and other countries learn from 2016 about the nexus of cyber warfare and disinformation to protect themselves against the next disinformation threat?
• Cyber warfare feeds disinformation; good cyber hygiene is one of the best first steps to protecting against disinformation
• The best way to lose: what were the major mistakes that led to the effectiveness of Russian influence?
• How can we avoid them in the future?
MODERATOR: BOB FLORES
EX CTO OF C.I.A
MODERATOR: JUNAID ISLAM
CTO & FOUNDER, VIDDER, CYBER
SECURITY EXPERT
LESSONS FROM THE DARK NET – KNOW YOUR HACKING ENEMY
Business suffers breaches of sensitive data every day, much of which ultimately ends up on the open web. While attention focuses on usernames and passwords, other information — home addresses,
dates of birth, security questions, IP addresses — can allow investigators to build up sophisticated profiles of their targets. How can law enforcement and media organizations tap this unprecedented
source of information, and how can individuals and businesses mitigate the risks?
• Overview of the breached data landscape
• Insight into advanced research techniques
• Information about tools to protect yourself and your business
DONALD CAVENDER
SPECIAL AGENT CYBER CRIME, FBI
MODERATOR: DR. JONATHAN REICHENTAL
CTO/CIO OF PALO ALTO
(SMART CITY, USA )’
GDPR, THIRD PARTY ACCESS AND PRIVILEGED ACCOUNT SECURITY”
It is not a question of if a company complies with GDPR, but when and how they do it. What is clear is that compliance will be very difficult without a strong Privileged Access Management strategy.
In this RT discussion we’ll explore strategies on how to provide proactive, end-to-end protection of privileged accounts that have access to the systems and applications containing personal data –
including how to secure and monitor third party access to these systems.
• For the first time the EU GDPR regulation places a number of obligations directly on data processors – even if it is a third party who is the processor. There is now a joint responsibility for securing personal data
• Remote, external users accessing your network from third-party organizations introduce a risk that can be mitigated
• Data protection by design and by default: incl. in the GDPR
MODERATOR: ELISE REVELL
INVENTOR, AUTHOR & SECURITY SPECIALIST
MODERATOR: FILIP JOHNSSÉN
SENIOR LEGAL COUNSEL PRIVACY,
KLARNA BANK AB
12:20
KEYNOTE
THE FUTURE OF CITIES: A CYBERSECURITY PERSPECTIVE
• What does digital transformation look like in a city context?
• What new cybersecurity risks are emerging?
• How do we need to think about prevention and mitigation?
DR. JONATHAN REICHENTAL
CTO/CIO OF PALO ALTO (SMART CITY, USA )
12:50
LUNCH, MEETINGS & NETWORKING
13:20
PANEL – MEDIA
MEDIA´S ROLE IN THE AGE OF CYBER WARFARE
• What are the cyber threats against the media?
• Disinformation – how to get the truth behind it?
• Can we use cyber to influence media direct or indirect?
MICHELE HANSSON
CISO, NEWS UK
KJETIL STORMARK
EDITOR, ALDIMER.NO
LOUIS GODDARD
DATA JOURNALIST – THE TIMES & THE SUNDAY TIMES
UK
DAGENS NYHETER
TBC
13:50
PANEL – DEFENSE & HOMELAND SECURITY
PERSONAL CYBER SECURITY: HOW TO REDUCE THE ”HUMAN ERROR FACTOR
In a world where information = power, your personal data = power. Surveillance is increasing rapidly, and so does the amount and types of data collected. Used together companies and governments
know more about us than we do ourselves.
• Awareness of methods used
• Ways to protect yourself
• Ways you could act to retain your power
DONALD CAVENDER
SPECIAL AGENT CYBER CRIME, FBI
ELISE REVELL
INVENTOR, AUTHOR AND SECURITY SPECIALIST
BOB FLORES
EX CTO OF C.I.A
14:20
KEYNOTE
DATA BREACH EXPOSURES
Common data breach exposures include personal information, such as credit card numbers, Social Security numbers and healthcare histories, as well as corporate information, such as
customer lists, manufacturing processes and software source code. If anyone who is not specifically authorized to do so views such data, the organization charged with protecting that
information is said to have suffered a data breach. If a data breach results in identity theft and/or a violation of government or industry compliance mandates, the offending organization
may face fines or other civil litigation.
• How did GDPR help your organizations to protect against data breaches?
• How to prevent data breaches?
• Learn how to deal with the aftermath of a data breach
MODERATOR: FILIP JOHNSSÉN
SENIOR LEGAL COUNSEL PRIVACY, KLARNA BANK AB
14:50
COFFEE & NETWORKING BREAK
16:20
PANEL: RETAIL
ANTONIO GRASSO
CYBER SECURITY ADVISOR, SIEMENS
MODERATOR: FILIP JOHNSSÉN
SENIOR LEGAL COUNSEL PRIVACY, KLARNA BANK AB
17:45
KEYNOTE – TBC
THEMES & TOPICS
09:40
COMPLIANCE & GOVERNANCE
THE ESSENTIAL STEPS FOR AN AUTOMATED COMPLIANCE
09:40
COMPLIANCE & GOVERNANCE
STRENGTHEN COMPLIANCE & GOVERNANCE WITH DEFENSIVE
CONTROLS AND FORENSIC ANALYSIS
10:00
PUBLIC SECTOR
RISK BASED SECURITY PROGRAM
10:00
PUBLIC SECTOR
A SECURITY-AWARE CULTURE IN A BORDERLESS SOCIETY
10:20
COFFEE & NETWORKING BREAK
11:00
IOT
SECURING DESIGNWARE IP FOR IOT
11:00
IOT
CYBER SECURITY IN THE CONNECTED WORLD – IMPLICATIONS OF IOT
WITH THE CONNECTED CITIZEN
11:20
AI/ROBOTICS
ARE WE GOING TO LOSE CONTROL OF WHAT WE CREATE?
11:20
AI/ROBOTICS
THE FRICTION BETWEEN HUMANITY & TECHNOLOGY
11:40
CYBER SECURITY
INFORMATION SECURITY POLICY: THE BENEFIT OF BEING
THREAT-AGNOSTIC